-
Notifications
You must be signed in to change notification settings - Fork 5.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Simplify saml2Login Samples #8990
Comments
I am currently trying to migrate from https://spring.io/projects/spring-security-saml to the new spring security saml integration, but I am getting endless redirects after the IDP login. Now I have seen, this simplification and gave it another try, but I am still facing the endless redirects. Maybe it would be great to provide a minimal Keycloak example as well. :) |
Hi, @dawi, sorry to hear you're having trouble. I've recently tested the existing Boot sample against a local Keycloak instance using Spring Security 5.4.1, and I was able to do it without specialized configuration. Because of that, I'm not sure that a new sample will help much. Two things might help here for your situation, though. First, endless redirects are usually caused when the relying party errors during authentication and forwards to Second, increase your logs |
Hi @jzheaux, thank you for your quick response. :) You are right, the redirect loop is caused by forwarding to The following configuration caused the issue: Where did this value come from? Well, I already had an example based on this one: https://blog.codecentric.de/en/2019/03/secure-spring-boot-app-saml-keycloak. So I downloaded the SAML MetaData from this example and configured the new example to look exactly the same. This example had logs with wrong configuration
logs with correct configuration
Maybe this will help someone who has the same issues. :) |
Glad you got it working, @dawi. Correct, unless you are customizing the endpoint where your application wants to receive assertions, setting the |
Let's simplify the Boot and JavaConfig saml2Login samples to not sign AuthnRequests.
Let's also simplify their
RelyingPartyRegistrationRepository
configuration.The text was updated successfully, but these errors were encountered: